Ads 468x60px

Search Engine

Loading

Featured Posts

Wednesday, 20 June 2012

Practicing safe hex (Antivirus)



No, it doesn’t involve witches’ incantations (though some people see hexadecimal code as magic). It’s just a geeky way of saying that you need to use your computer safely and responsibly, even if you already have some defensive capabilities such as antivirus programs. As it happens, some safe-hex practices can also help you differentiate a Trojan horse from a legitimate message. Here’s a checklist of basic pointers:

Monday, 21 May 2012

The Origins of Antivirus Tools


In 1991, Symantec released the first version of Norton AntiVirus. Norton was a popular brand name among computer technophiles from the well-known and successful Norton Utilities program. Programs like Norton AntiVirus are designed to find and eliminate viruses from a computer, usually with three goals in mind:
_ Make the virus stop doing harm to the computer it has infected
_ Stop the spread of the virus
_ Limit any further harm the virus can do

The People Who Write Viruses


Sometimes I think that it helps to understand a little bit more about the people who perpetrate crimes, in order to be able to avoid being a victim of those crimes. Others of you may just have a morbid curiosity about those who like to hurt other people. Either way, you’ll learn a little more about the people who construct the malicious programs that cause billions of dollars of damage each year.
Why they write ’em
The actual crime of writing and distributing viruses is a crime of anonymity: The perpetrators usually carry out their crimes anonymously, from the safety of their rooms. They expect never to meet their victims face to face — in fact, they rarely know who their victims are.

Friday, 11 May 2012

How Early Viruses Spread from Computer to Computer


In the mid-to-late 1980s, data was most often transferred from computer to computer by using floppy disks and so-called bulletin board systems (BBSs), managed online locations that were the forerunners of today’s Web sites.
Stowing away on floppy disks
Even without using the Internet, people in offices where PCs were used traded and circulated programs, documents, and spreadsheets — not to mention jokes, games, filthy pictures, and so forth. The standard method was sneaker net — walking up to another person and handing over a floppy disk.

Friday, 27 April 2012

Invasion of the Computer Viruses



Simply stated, a computer virus is a computer program written by a person (not always, but usually, a jerk) who designed it to spread to as many computers as possible.
This definition seems simple enough, but indulges me. I’d like to zero in a bit further, to clarify some issues and to dispel some misunderstandings:
Computer program: A virus is nothing more than a set of instructions, written in a high-level programming language, such as Visual Basic, C, C++, or Java, translated into “native” instructions (a long list of ones and zeros) that are used by the computer’s CPU.

Friday, 3 February 2012

First Computer Virus (Brain, the first virus)


In Pakistan, Basit Farooq Alvi and Amjad Farooq Alvi ran a computer store called Brain Computer Services.
They soon discovered that a floppy disk contained computer instructions that were executed when the computer was first turned on. Basit and Amjad used this knowledge for their own purposes and created computer instructions that would change the label of floppy disks in the computer to (C) Brain. The instructions would make a copy of themselves onto other floppy disks that were inserted into the floppy-disk drive.

Friday, 27 January 2012

China Emerging SuperPower 21st Century


Is China Emerging Superpower in the 21st Century?
American economy is really in bad shape. About 1.2 million people have lost their jobs during the last 2 years economic meltdown. The unemployment rate has gone up to 11%. America is presently the most highly indebted country in the world. With total loans of about 17 trillion dollars, china is the biggest single lender having a share of about $ one trillion. It is estimated that USA would add another 7 Trillion dollars to it burden of debits during the next five years to meet its budget deficits. Street demonstrations with banners and play cards such as “we have been fighting Iraq and afghan war with borrowed money, is unjustified and unwinnable war” stop plying world policeman role and concentrate on your economy and wellbeing of the people are on the rise. This shows the public mood and disapproval of their government policies. 

How to Installing Symantec Endpoint Protection 12.0 for Windows



Step-by-step instructions on how to install Symantec Endpoint Protection for Windows.

Symantec Endpoint Protection Setup Manual
If there is other antivirus software they should be uninstalled before installing Symantec EndPoint Protection Software. Otherwise, Different Antivirus software can detect definition files of other software as a threat that can create some problems. 

First of all if you have Zip file. Extract it now as showing you in listing

Saturday, 14 January 2012

China's Economy Growth Policy


China, the third largest country in the world, is famous for various things; it has one of the world eldest people, civilization, and world’s longest used written languages, many major inventions like paper, compass, gunpowder and printing, The Great wall of china, friendly people, and the best geographical condition. China situates in the eastern Asia which share it borders with Korea Afghanistan, Pakistan, India, Nepal, Sikkim, Bhutan, Burma, Laos and Vietnam. Major cities of china are Beijing, Chengdu, Hong Kong, Lhasa, pingyao, shanghai, Xian, yangshuao, and Urumqi, Suzhou and many others.